Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here
Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Answerclub

Answerclub Logo Answerclub Logo

Answerclub Navigation

  • Home
  • About Us
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • About Us
  • Contact Us

Welcome to Answerclub.org

Questions | Answers | Discussions | Knowledge sharing | Communities & more.

Get App on Playstore
Home/ Questions/Q 204263
Next
In Process

Answerclub Latest Questions

Shruti Sharma.
  • 0
  • 0
Shruti Sharma.Knowledge Contributor
Asked: August 17, 20242024-08-17T15:55:40+05:30 2024-08-17T15:55:40+05:30In: Technology

What is cyber security?

  • 0
  • 0
What is cyber security?
aieducationquestiontechnology
4
  • 4 4 Answers
  • 72 Views
  • 0 Followers
  • 0
Answer
  • Report

4 Answers

  • Voted
  • Oldest
  • Recent
  • Random
  1. Priyanka Rani
    Priyanka Rani Beginner
    2025-07-01T22:20:35+05:30Added an answer on July 1, 2025 at 10:20 pm

    Cybersecurity is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage. It ensures confidentiality, integrity, and availability of information in the digital world https://www.excellencetechnology.in/cyber-security-course-in-chandigarh/

      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  2. HDM
    HDM Knowledge Contributor
    2024-08-25T19:27:35+05:30Added an answer on August 25, 2024 at 7:27 pm

    Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
    eg: Third Part Cookies on world wide web – By tracking users’ browsing habits, third-party cookies contribute to the creation of detailed profiles, raising serious privacy concerns. The accumulation of such information allows for the targeted delivery of advertisements and content, often without users consent.

      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  3. manali
    manali Knowledge Contributor
    2024-08-22T12:21:50+05:30Added an answer on August 22, 2024 at 12:21 pm

    Cybersecurity involves protecting computer systems, networks, and data from digital attacks, theft, and damage. It encompasses various measures and practices to safeguard information and ensure the integrity, confidentiality, and availability of digital assets.

      • 1
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  4. [Deleted User]
    [Deleted User]
    2024-08-20T16:26:58+05:30Added an answer on August 20, 2024 at 4:26 pm

    Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users through ransomware; or interrupting normal business processes.

      • 1
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

You must login to add an answer.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sidebar

Ask A Question

Stats

  • Questions 57,196
  • Answers 51,607
  • Popular
  • Answers
  • Mr.Doge

    What are the best AI tools available for Creative Designing?

    • 47 Answers
  • Mr.Doge

    How is tax calculated in India for investing in US ...

    • 41 Answers
  • Mr.Doge

    How to invest in NCD/ Corporate Bonds in India? Is ...

    • 35 Answers
  • The Vensej Mall Gurgaon
    The Vensej Mall Gurgaon added an answer The Vensej Mall is widely recognized as a food hub… November 4, 2025 at 6:51 pm
  • Kundan Pandit
    Kundan Pandit added an answer Any organization, regardless of size or sector—manufacturing, construction, healthcare, IT,… November 4, 2025 at 6:09 pm
  • Sumit Seo
    Sumit Seo added an answer The process involves: Defining the ISMS scope and performing a… November 4, 2025 at 6:03 pm

Related Questions

  • Why are immersive visuals more effective than traditional 2D renderings ...

    • 1 Answer
  • Why are interactive location maps essential for real estate marketing?

    • 1 Answer
  • What makes interactive 3D visuals more impactful than static renders?

    • 1 Answer
  • How can interactive 3D mapping transform large-scale real estate development ...

    • 1 Answer
  • Can real estate developers use web-based 3D walkthroughs to reach ...

    • 1 Answer

Trending Tags

ai biology branch of study business cricket education english food general knowledge. general science geography gk health history poll question science sports technology travel

Explore

  • Home
  • Groups
  • Add group
  • Catagories
  • Questions
    • New Questions
    • Most Answered
  • Polls
  • Tags
  • Badges

© 2024 Answerclub.org | All Rights Reserved
Designed & Developed by INFINITEBOX & TechTrends